In this work, we present a novel solution aimed at improving robotic manipulators' performance in contact tasks. Inspired by the human motor control system, which relies on a feedforward mechanism to anticipate an...
详细信息
Although conventional control systems are simple and widely used, they may not be effective for complex and uncertain systems. This study proposes a Hermite broad-learning recurrent neural network (HBRNN) with a wide ...
详细信息
Millimeter-wave network deployment is an essential and ongoing problem due to the limited coverage and expensive network infrastructure. In this work, we solve a joint network deployment and resource allocation optimi...
详细信息
Millimeter-wave network deployment is an essential and ongoing problem due to the limited coverage and expensive network infrastructure. In this work, we solve a joint network deployment and resource allocation optimization problem for a mmWave cell-free massive MIMO network considering indoor environments. The objective is to minimize the number of deployed access points (APs) for a given environment, bandwidth, AP cooperation, and precoding scheme while guaranteeing the rate requirements of the user equipments (UEs). Considering coherent joint transmission (C-JT) and non-coherent joint transmission (NC-JT), we solve the problem of AP placement, UE-AP association, and power allocation among the UEs and resource blocks jointly. For numerical analysis, we model a mid-sized airplane cabin in ray-tracing as an exemplary case for IDS. Results demonstrate that a minimum data rate of 1 Gbps can be guaranteed with less than 10 APs with C-JT. From a holistic network design perspective, we analyze the trade-off between the required fronthaul capacity and the processing capacity per AP, under different network functional split options. We observe an above 600 Gbps fronthaul rate requirement, once all network operations are centralized, which can be reduced to 200 Gbps under physical layer functional splits. 2002-2012 IEEE.
Despite considerable research into information diffusion, most models focus on static networks. Networks in the real world change over time and information is lost when a node disappears. We sought to resolve the prob...
详细信息
This work presents an accelerator that performs blind deblurring based on the dark channel prior. The alternating minimization algorithm is leveraged for latent image and blur kernel estimation. A 2-D Laplace equation...
详细信息
In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and lower correlation of the encrypted data are achieved using the multi-c...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
Power line communication (PLC) systems enable information exchange over existing electric power grids at a low deployment cost. Such systems constitute a crucial component of smart grids. However, PLC is negatively af...
详细信息
暂无评论